Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6044: Files or Directories Accessible to External Parties in Google ChromeOS

0
Medium
VulnerabilityCVE-2025-6044cvecve-2025-6044
Published: Mon Jul 07 2025 (07/07/2025, 18:58:45 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: ChromeOS

Description

An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on the garaged stylus devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature.

AI-Powered Analysis

AILast updated: 07/14/2025, 21:06:33 UTC

Technical Analysis

CVE-2025-6044 is an Improper Access Control vulnerability identified in the Stylus Tools component of Google ChromeOS version 16238.64.0, specifically affecting garaged stylus devices. The vulnerability allows a physical attacker to bypass the device's lock screen and gain unauthorized access to user files. The attack vector involves removing the stylus from the device while it is closed and then exploiting the screen capture feature to access files without authentication. This indicates a flaw in the access control mechanisms governing file and directory permissions when the device is locked, particularly related to stylus interactions. The vulnerability is classified under CWE-287 (Improper Authentication), highlighting that the system fails to properly verify user credentials or device state before granting access. The CVSS v3.1 base score is 6.1 (medium severity), with an attack vector of physical (AV:P), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), but no impact on availability (A:N). There are no known exploits in the wild and no patches currently available. This vulnerability is significant because it allows direct physical bypass of security controls, potentially exposing sensitive user data without requiring sophisticated technical skills or remote access.

Potential Impact

For European organizations, this vulnerability poses a tangible risk particularly to sectors where ChromeOS devices with stylus support are used in sensitive environments, such as education, government, and corporate offices. The ability to bypass the lock screen and access files physically undermines endpoint security, potentially leading to data breaches involving confidential information, intellectual property, or personal data protected under GDPR. Since the attack requires physical access, the threat is more pronounced in scenarios where devices are left unattended or in shared spaces. The integrity of data can also be compromised, as attackers might modify or exfiltrate files without detection. Although availability is not impacted, the breach of confidentiality and integrity can lead to regulatory penalties, reputational damage, and operational disruptions. The lack of a patch increases the window of exposure, necessitating immediate compensating controls. The medium severity rating reflects the physical access requirement but high impact on data security, making it a critical consideration for organizations with high-value or sensitive data on ChromeOS devices.

Mitigation Recommendations

Beyond generic advice such as applying patches (which are currently unavailable), European organizations should implement strict physical security controls to mitigate this vulnerability. This includes enforcing policies that prevent unattended devices in public or shared environments, using physical locks or secure storage for devices when not in use, and educating users about the risks of leaving devices accessible. Additionally, organizations should consider disabling or restricting the stylus screen capture feature via device management policies if possible, or configuring ChromeOS to require re-authentication for any screen capture or stylus-related actions when the device is locked. Employing endpoint detection and response (EDR) tools that can monitor unusual device interactions or file access patterns may help detect exploitation attempts. Organizations should also maintain an inventory of affected ChromeOS devices and monitor vendor communications for patches or updates. Finally, implementing full disk encryption and strong user authentication mechanisms can reduce the impact of unauthorized file access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ChromeOS
Date Reserved
2025-06-12T21:41:59.445Z
Cvss Version
null
State
PUBLISHED

Threat ID: 686c1b656f40f0eb72ec2c9b

Added to database: 7/7/2025, 7:09:25 PM

Last enriched: 7/14/2025, 9:06:33 PM

Last updated: 10/7/2025, 1:48:19 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats